You do not have permission to edit this page, for the following reasons:
Please read before you start to fill in the form!
Put the detailed description for the project into this field. This will show up as the content of the project page:
Hi! I'm designing and implementing a secure bootloader meant to be used for CTF challenges (but not only); therefore the firmware running is insecure by-design. It will be automotive-like and therefore will be flashed over automotive protocols (CAN, ISOTP, UDS) and it's going to be open-source! Currently, the project is still in quite an early stage, but the goal is to have the following: * secure flashing over automotive protocols ** no binary manipulations ** protect the flag/secrets located within the binary when flashing over the untrusted distribution channel ** protect crypto keys/secrets located in the bootloader * microprocessor: ATSAME70N21B (ARM Cortex-M7) * use hardware capabilities like the Memory Protection Unit (protect secrets in flash), Crypto Module (make it fast), the internal clock (to counter clock-glitching attacks), ... Let's discuss the concept! Exchange new ideas on possible attack vectors and hardening a secure bootloader (or other embedded software). I will have the hardware with me! If you're interested I'll be happy to talk to you about it! You can also talk to me about automotive security/embedded security/pentesting in general - there are a lot of interesting topics to talk about. You'll sometimes find me at the Binary Kitchen Assembly; preferably hit me up through email ([mailto:project.m.schroetter@gmail.com project.m.schroetter@gmail.com]) or you can also call me on Phone 8900.
Summary:
This is a minor edit Watch this page
Cancel